🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🕵️ Domain Enumeration

Active Directory Discovery, Network Reconnaissance, Security Assessment, LDAP Queries

Turbocharged Storage: MinIO, KIOXIA, and AMD team up to take on AI
blog.min.io·9h
🧲RISC-V Preservation
The Only Vendor Named a SASE Leader for the Third Time
paloaltonetworks.com·1d
📊Homelab Monitoring
Why pay for an analytics tool when Google Analytics is free?
plausible.io·20h·
Discuss: Hacker News
📊Feed Optimization
EchoVaults - Digital Vaults for loved ones in emergency situations.
echovaults.org·9h·
Discuss: Hacker News
🏠Personal Archiving
.NET: From Zero to Hero
dotnetz2h.com·3d·
Discuss: Hacker News
🐚Nordic Shell
NixOS: Declarative Management, Imperative Privilege Escalation
labs.snyk.io·1d·
Discuss: Lobsters, Hacker News
❄️Nixpkgs
One misclick away: How I found a critical vulnerability in a dating app
hame.page·3d·
Discuss: Hacker News
🚀Indie Hacking
Implementing Basic Authentication in FastAPI
dev.to·1d·
Discuss: DEV
🌐Network Protocols
Oracle Fixes Critical Bug in Cloud Code Editor
darkreading.com·12h
🔓Hacking
Tracing the Path to Grokking: Embeddings, Dropout, and Network Activation
arxiv.org·4h
🧠Machine Learning
Deep Generative Methods and Tire Architecture Design
arxiv.org·4h
🌀Riemannian Computing
Static or Temporal? Semantic Scene Simplification to Aid Wayfinding in Immersive Simulations of Bionic Vision
arxiv.org·1d
✋Tactile Computing
SAGE: A Context-Aware Approach for Mining Privacy Requirements Relevant Reviews from Mental Health Apps
arxiv.org·2d
💻Local LLMs
AsyncRAT Spawns Concerning Labyrinth of Forks
darkreading.com·1d
🔓Hacking
Data Fusion and Aggregation Methods to Develop Composite Indexes for a Sustainable Future
arxiv.org·2d
🧠Query Planners
Web-Browsing LLMs Can Access Social Media Profiles and Infer User Demographics
arxiv.org·4h
⚖️Feed Ranking
Thought Purity: Defense Paradigm For Chain-of-Thought Attack
arxiv.org·4h
🛡️Proof-Carrying Archives
Improving Data and Parameter Efficiency of Neural Language Models Using Representation Analysis
arxiv.org·4h
🧮Kolmogorov Complexity
Build AI-driven policy creation for vehicle data collection and automation using Amazon Bedrock
aws.amazon.com·2d
🤖Archive Automation
Secure and Efficient UAV-Based Face Detection via Homomorphic Encryption and Edge Computing
arxiv.org·2d
🔐Homomorphic Encryption
Loading...Loading more...
AboutBlogChangelogRoadmap